Attack Types Flashcards
What is social engineering?
Social engineering is the process by which the attacker seeks to extract info from users by tricking them into helping the attacker. It’s very successful because it relies on human emotions.
What is phishing?
Phishing is a type of social engineering conducted via electronic communications. It is an attempt to acquire sensitive info by pretending to be a trustworthy entity, typically via email. Phisher tries to persuade victim to perform a series of actions that provides access to confidential info. Phishing emails have gotten more sophisticated, but user education is the best defense against this.
What is spear phishing?
Spear phishing is a targeted form of phishing, often aimed at a specific individual. In contrast, phishing often involves mass emailing.
What is whaling?
Whaling is almost identical to spear phishing, except it goes after high profile targets like executives.
What is vishing?
AKA voice phishing. Attacker uses a fake caller ID to appear as a trusted organization and attempts to get the individual to enter account details over the phone.
What is smishing?
AKA SMS phishing. Attack that uses phishing methods via text messaging.
What is pharming?
Pharming redirects the victims to a fake website, even if user enters the correct website url. This is typically possible via another attack, such as DNS cache poisoning.
What is tailgating?
Tailgating involves piggybacking or following closely behind someone who has authorized physical access within an environment. It also involves appearing to be a part of an authorized group or capitalizing on people’s desires.
What is a mantrap?
It’s an airlock-like mechanism that allows one one person to pass at a time. It’s intended to provide entrance control and prevent tailgating.
What is impersonation?
A method in which someone assumes the character or appearance of someone else.
What is dumpster diving?
The act of scavenging for discarded equipment and documents in the trash.
What is shoulder surfing?
Looking over one’s shoulder to obtain information. Prevention of this is user awareness, but can be assisted by mirrors or screen overlays.
How are hoaxes harmful?
Hoaxes present a threat that does not actually exist at face value. The real harm is in the response to the hoax, which can create unnecessary fear and irrational behaviors.
What is a watering hole attack?
Similar to spear fishing but instead of using email, the attacker attacks a site that the target frequently visits. The goal is to compromise the larger environment, such as the company the target works for. These attacks are commonly used in conjunction with a zero-day exploit.
Name the principles of influence that a social engineer might use
- Authority
- Intimidation
- Consensus/social proof
- Scarcity/ urgency
- Familiarity/liking
- Trust
What is spoofing?
Spoofing is a method of providing false identity info to gain unauthorized access.
How does IP and MAC spoofing work?
IP spoofing is where the attacker modifies the source address of traffic or the source of info. Attacker can pretend to be the system of of a forged io address. Similarly, MAC spoofing can forge a MAC address and potentially gain access control.
**IP spoofing seeks to bypass IP address filters by setting up a connection from a client and sourcing the packets with an IP address that is allowed through the filter.
What is the difference between blind and informed spoofing?
Blind spoofing is where the attacker sends data and only makes assumptions of responses. Informed spoofing is where an attacker can participate in a session and can monitor the bidirectional communications.
What is a buffer overflow?
Occurs when data given to an application or service exceeds the storage space that was allocated in memory for that app/service. The overflow of input data must be discarded or somehow handled by the application. A buffer overflow can cause data or memory storage to be overwritten, result in a denial of service, and an originator can execute arbitrary code at a privilege level.
What is an integer overflow?
A type of overflow that is specific to whole numbers.
What is privilege escalation?
Gaining special privileges through a programming error or oversight.
What is a zero-day attack?
AKA zero hour or day zero attack. It’s an attack that tries to exploit computer app vulnerabilities that are unknown to others or even the software developer. Uses Zero-day exploits, which are software that uses a security hole to carry out an attack. Zero-day vulnerabilities do not have a patch available yet and are not detected by anti-malware software.
What is cross-site scripting (XSS)?
A type of code injection where malicious script is placed client-side on a website. An attacker can cause an unknowing user to conduct unauthorized access activities, expose confidential data, and log successful attacks back to the attacker without being aware. XSS vulnerabilities can be used to hijack the user’s session.